Abstract
Binary representation is a popular privacy-preserving biometric recognition approach. However, it is vulnerable to similarity-based reconstruction attacks (i.e., similarity attacks) due to its similarity-preserving property. In this paper, the cause of this security threat is studied, a sufficient condition for secure anti-similarity-attack hashing (ASAH) is derived, and the definition of the ASAH manifold is provided. Moreover, a general framework is proposed for employing a statistical manifold to locate a secure hash function in a given hash function family. Specifically, a secure hash function can be obtained by finding the point that is closest to the ASAH manifold in the hash function family manifold. A generalized expectation-maximization-based algorithm is then developed to optimize this process. In addition, a case study is presented to clarify the implementation details of the aforementioned algorithm. In particular, an ideal ASAH submanifold is constructed through random generation to enhance the feasibility of the proposed framework, enabling ideal hash code generation. In addition, the generative adversarial network framework is adopted to generate high-quality hash codes; the distribution of these hash codes is close to that of the ideal hash codes. We perform experiments on public biometric datasets to verify that our approach can achieve both superior recognition performance and higher security under reconstruction attacks.
Similar content being viewed by others
References
Wei W, Wang J, Yan Z, Ding W (2022) Epmdroid: efficient and privacy-preserving malware detection based on sgx through data fusion. Inform Fus 82:43–57
Stallings W (2019) Cryptography and network security: principles and practice, 8th edn, vol 6. Pearson
Albrecht M, Chase M, Chen H, Ding J, Goldwasser S, Gorbunov S, Halevi S, Hoffstein J, Laine K, Lauter K, Lokam S, Micciancio D, Moody D, Morrison T, Sahai A, Vaikuntanathan V (2018) Homomorphic encryption security standard. Technical report, HomomorphicEncryption.org. Toronto, Canada
Ajay K (2020) A survey on secure communication techniques for 5g wireless heterogeneous networks. Inform Fus 62:89–109
Kumar S, Gupta A, Walia GS (2020) Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges. Applied Intelligence
Morampudi MK, Prasad MVNK, Raju USN (2021) Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor. Appl Intell 51:6823–6836
Boufounos PT (2012) Universal rate-efficient scalar quantization. IEEE Trans Inf Theory 58 (3):1861–1872
Chen Y, Wo Y, Xie R, Chudan W u, Han G (2019) Deep secure quantization: on secure biometric hashing against similarity-based attacks. Signal Process 154:314–323
Fei L, Zhang B, Tian C, Teng S, Wen J (2021) Jointly learning multi-instance hand-based biometric descriptor. Inform Sci 562:1–12
Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255
Tarek M, Hamouda E, Abohamama AS (2022) Multi-instance cancellable biometrics schemes based on generative adversarial network. Appl Intell, 52
Portêlo J, Raj B, Abad A, Trancoso I (2014) Privacy-preserving speaker verification using secure binary embeddings. In: 2014 37th International convention on information and communication technology, electronics and microelectronics (MIPRO), pp 1268–1272
Yang W, Wang S, Hu J, Zheng G, Yang J, Valli C (2019) Securing deep learning based edge finger vein biometrics with binary decision diagram. IEEE Trans Industr Inform 15(7):4244–4253
Feng YC, Lim M-H, Yuen PC (2014) Masquerade attack on transform-based binary-template protection based on perceptron learning. Pattern Recogn 47(9):3019–3033
Kaplan E, Gursoy ME, Nergiz ME, Saygin Y (2020) Known sample attacks on relation preserving data transformations. IEEE Trans Depend Sec Comput 17(2):443–450
Lai Y, Jin Z, Wong KS, Tistarelli M (2021) Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans Inform Forens Secur 16:3170–3185
Wang Y, Ward R, Wang ZJ (2019) Coarse-to-fine image dehashing using deep pyramidal residual learning. IEEE Signal Process Lett 26(9):1295–1299
Wang Y, Palangi H, Jane Wang Z, Wang H (2018) Revhashnet: perceptually de-hashing real-valued image hashes for similarity retrieval. Signal Process Image Commun 68:68–75
Wu Z, Ke M, Wo Y, Zhong X (2022) Masquerade attack on biometric hashing via biohashgan. The Visual Computer
Wang J, Zhang T, song J, Sebe N, Shen HT (2018) A survey on learning to hash. IEEE Trans Pattern Anal Mach Intell 40(4):769–790
Wang M, Zhou W, Tian Q, Li H (2018) A general framework for linear distance preserving hashing. IEEE Trans Image Process 27(2):907–922
Qi L i, Sun Z, He R, Tan T (2020 ) A general framework for deep supervised discrete hashing. Int J Comput Vis 128:2204–2222
Yuan L, Wang T, Zhang X, Tay FE, Jie Z, Liu W, Feng J (2020) Central similarity quantization for efficient image and video retrieval. In: 2020 IEEE/CVF Conference on computer vision and pattern recognition (CVPR), pp 3080–3089
Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901
Shun-ichi A (2016) Information geometry and its applications. Springer, Japan
Amari S-i, Tsuchiya N, Oizumi M (2018) Geometry of Information Integration: On the Occasion of Shun-ichi Amari’s 80th Birthday, IGAIA IV Liblice, Czech Republic, June 2016, pp 3–17. 01
Goodfellow IJ, Pouget-Abadie J, Mirza M, Bing X u, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Proceedings of the 27th international conference on neural information processing systems - vol 2, NIPS’14. MIT Press, Cambridge, pp 2672–2680
Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training gans. In: Proceedings of the 30th international conference on neural information processing systems, NIPS’16. Curran Associates Inc, Red Hook, pp 2234–2242
Isola P, Zhu J, Zhou T, Efros AA (2017) Image-to-image translation with conditional adversarial networks. In: 2017 IEEE Conference on computer vision and pattern recognition (CVPR), pp 5967–5976
Casia-irisv4-interval iris image database, http://biometrics.idealtest.org/#/datasetDetail/4
Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Number 07–49
Casia palmprint database, http://biometrics.idealtest.org/#/datasetDetail/5
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on computer vision and pattern recognition (CVPR), pp 770–778
Deng J, Dong W, Socher R, Li L, Li K, Li F-F (2009) Imagenet A large-scale hierarchical image database. In: 2009 IEEE Conference on computer vision and pattern recognition, pp 248–255
Gomez-Barrero M, Galbally J, Rathgeb C, Busch C (2018) General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans Inform Forens Secur 13(6):1406–1420
security I (2022) cybersecurity and privacy protection — biometric information protection. ISO/IEC 24745:2022
Kumar N, Manisha (2022) Cbrw: a novel approach for cancelable biometric template generation based on 1-d random walk. Appl Intell, 546
Mai G, Cao K, Lan X, Yuen PC (2021) Secureface: face template protection. IEEE Trans Inform Forens Secur 16:262–277
Acknowledgements
This work is supported by National Natural Science Foundation of Guangdong [Grant No. 2021A1515012020], and Guangzhou science and technology plan project [Grant No.202002030298].
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yu, L., Wo, Y. A general framework for secure biometric hashing against reconstruction attacks. Appl Intell 53, 12811–12830 (2023). https://doi.org/10.1007/s10489-022-04153-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-022-04153-4